This bug was fixed in the package juju-core - 2.0.2-0ubuntu2.1
---------------
juju-core (2.0.2-0ubuntu2.1) zesty-security; urgency=medium
* SECURITY UPDATE: Privilege escalation via juju-run (LP: #1682411)
- debian/patches/CVE-2017-9232.patch: create a unix domain socket with
restricted permissions to limit juju-run to only similarly privileged
processes.
- CVE-2017-9232
-- Seth Arnold <[email protected]> Thu, 25 May 2017 17:32:58
-0700
** Changed in: juju-core (Ubuntu)
Status: Confirmed => Fix Released
** Changed in: juju-core (Ubuntu)
Status: Confirmed => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1682411
Title:
juju-run unit root escalation vulnerability
To manage notifications about this bug go to:
https://bugs.launchpad.net/juju/+bug/1682411/+subscriptions
--
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs